International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Towards Security Two-part Authenticated Key Agreement Protocols

Authors:
Songping Li
Quan Yuan
Jin Li
Download:
URL: http://eprint.iacr.org/2005/300
Search ePrint
Search Google
Abstract: We first present a new security 2-AK protocol, which is more secure and more efficient than previously proposed ones. Meanwhile, we point that Xie's ID-2-AK protocol modified from McCullagh-Barreto in CT-RSA 2005 doesn't provide protection against KCI attack likewise, and finally utilize the modular arithmetic, first proposed in MQV and also used in Kim, to get a modified new ID-2-AK protocol. On second thoughts, we give another ID-2-AK protocol utilizing the operation of addition in finite field like our forenamed 2-AK protocol. The two ID-2-AK protocols are in possession of all the desired security attributes. We also compare our new protocols with others in terms of computational cost and security properties.
BibTeX
@misc{eprint-2005-12634,
  title={Towards Security Two-part Authenticated Key Agreement Protocols},
  booktitle={IACR Eprint archive},
  keywords={cryptographic protocols / key management, authenticated protocol, ID-based,  Key Compromise Impersonation},
  url={http://eprint.iacr.org/2005/300},
  note={ lsp@pku.edu.cn 13033 received 25 Aug 2005, last revised 7 Sep 2005},
  author={Songping Li and Quan Yuan and Jin Li},
  year=2005
}